Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear unsupervised hashing for ANN search in Euclidean space., , , , and . Neurocomputing, (2016)PaddyFrog: systematically detecting confused deputy vulnerability in Android applications., , , , and . Security and Communication Networks, 8 (13): 2338-2349 (2015)SMART: A platform for cross-domain business process collaboration., and . CSCWD, page 195-200. IEEE, (2010)A Bayesian approach to performance modelling for multi-tenant applications using Gaussian models., , , , and . IJHPCN, 9 (1/2): 150-159 (2016)Cloud Data Management for Scientific Workflows: Research Issues, Methodologies, and State-of-the-Art., , and . SKG, page 21-28. IEEE Computer Society, (2014)Opportunistic Work-Rest Scheduling for Productive Aging., , , , , and . HCI (14), volume 10914 of Lecture Notes in Computer Science, page 413-428. Springer, (2018)Spatial Crowdsourcing Task Assignment Based on the Quality of Workers., , , , , , , and . ICCSE, page 28:1-28:6. ACM, (2018)Predicting hospital readmission from longitudinal healthcare data using graph pattern mining based temporal phenotypes., , , , , and . BIBM, page 824-829. IEEE Computer Society, (2017)Ethically Aligned Opportunistic Scheduling for Productive Laziness., , , , , and . AIES, page 45-51. ACM, (2019)Empirical Study on Assessment Algorithms with Confidence in Crowdsourcing., , , and . ICCSE, page 100-104. ACM, (2017)